2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2020
DOI: 10.1109/icrito48877.2020.9197961
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Literature Review of Penetration Testing & Its Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Proxy tools [29] are essential in mobile penetration testing for intercepting and analyzing traffic between the mobile application and the backend server. Table 6 highlights two widely used proxy tools.…”
Section: Proxy Toolsmentioning
confidence: 99%
“…Proxy tools [29] are essential in mobile penetration testing for intercepting and analyzing traffic between the mobile application and the backend server. Table 6 highlights two widely used proxy tools.…”
Section: Proxy Toolsmentioning
confidence: 99%
“…Pen-testing enables the person carrying out PEN-testing to check out the system's functional aspects, that is, the extent to which a system is vulnerable to network security and intrusion attacks, and view the system's defense mechanisms to mitigate these attacks. The authors of [9] conducted a comprehensive literature review of pen-testing and its applications. The study reviewed the work conducted in the field of pen-testing.…”
Section: Related Workmentioning
confidence: 99%
“…How to build attack chains and use all collected information after emulation for security awareness of organization. [8] 2020 lack of realism Static VAPT Audit and implementation [9] 2020 lack of methodology Static VAPT literature review [10] 2020 Limited scope Static Cyber attack emulation agents [11] 2020 Limited scope Static Learning associations of adversary techniques [12] 2020 lack of methodology Static CTI for improving adversary understanding [13] 2020 lack of methodology Static Zero entry hacking and misconfigurations on VAPT [14] 2019 lack of realism Static VAPT as Cyber defense [15] 2019 Limited scope known VAPT for web app and network [16] 2019 Limited scope known Post exploitation Agentless VAPT and Automation [17] 2019 Limited scope known Bird eye view penetration testing knowledge [18] 2019 lack of methodology known Concept of cyber defense exercise CDX [19] 2018 lack of methodology known Enhancing automotive penetration testing [20] 2018 LImited scope known Redefining VAPT [16] 2018 no methodology known Cyber kill chain and cyber ops [21] 2018…”
Section: Related Workmentioning
confidence: 99%